Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Explore 10,000+ tools
Simplify Purchasing For Your Business
Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.
Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
...Purpose of command is to count usage ratio of each IP range and shared network pool which ISC dhcpd is in control of. Users of the command are most likely ISPs and other organizations that have large IP space.
Program is written C. Design goal is to get analysis done quickly where there is lots of data. On cheap laptop the speed of analysis is roughly 100k leases per second. Number of ranges, or shared networks, does not make any significant difference in getting analysis done.
Free Syslog Server for Windows with a graphical user interface
Visual Syslog Server for Windows is a free open source program to receive and view syslog messages.
Useful when setting up routers and systems based on Unix/Linux.
Visual Syslog Server for Windows has a live messages view: switches to a new received message. Helpful color highlighting.
Useful message filtering. Customizable notification and actions.
Sources hosted on the GitHub:
https://github.com/MaxBelkov/visualsyslog
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
...If necessary, it is possible to view detailed statistics on every MAC address, including COOKIES, USER-AGENTS, HTTP GET/POST and a lot more.
Please visit forum - if you have any idea :-)
Last version my program you can search in my home web page! Thanks!
Sorts ip flow data from Cisco IOS routers and switches
...It can be helpful in finding the source of highest traffic on connections overutilized by legitimate traffic or DoS attacks. To use it, paste the entire output of either command in the input textbox and hit ‘Run’. By default the program will deliver the top 10 talkers in descending order, sorted by the number of packets/bytes sent (taken from the last column of the output). The program processes up to 100 000 lines of traffic data and the results can be saved to a .txt file.
esweep is a scriptable audio measurement program which features various signals and signal processing functions. Its main purpose is the measurement of speakers.
A program for getting and parsing data from the Arduino forum and sending them to your Arduino. This can be used to for example make a post counter for one topic. The computer side program is programed in Qt.
A program and service allowing automatic import of log files from IIS, COM+, Apache, Windows Event, Linux System logs etc into a database of type MSSQL, Oracle, MySQL, or Postgresql.
Fully managed relational database service for MySQL, PostgreSQL, and SQL Server
Focus on your application, and leave the database to us
Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
The logjana program is a log program for the jana proxy server V2. It splits the main logfile "proxy.log" in timed files. The main logfile "proxy.log" will not be change. For questions send a mail at michael.wiechert(at)goo
With the Log Parser one can scan logs, whitelist out legitimate, non-corrupt entries (usually file paths), and apply a standard format to a log generated by any antivirus or malware-removal program. This makes for easier reading of the meat in any log.
statmail is a nearly drop-in replacement for the `mailstat' program that comes with procmail. It aims at being faster and more correct than mailstat when computing e-mail statistics.
Bibro can tell you who, why and when visit your site. This program is very powerful, use filters (so you can choose statistics to analysis not only by time) and has modular structure.
StatViz is a web log analysis / statistics program in PHP for visualizing web traffic. StatViz produces two types of graphical reports: 1) aggregate clickstream analysis and 2) individual session tracks. The DOT output is visualized using GraphViz.
Loganalyzer for Windows XP Firewall and Linux Iptables firewall. Generates a nice html document with statistics from all the pakets captured by the firewall. The program is written in Python and has an (optional) graphical interface.
ShamStats is a program which parses server logs from Counter-Strike:Source servers and then outputs all player statistics in HTML. Written in JAVA, this program runs on all platforms with JRE.
This program runs on XP/2000/NT plataform using the Microsoft .NET Framework and Microsoft SAPI speech / voice engine.
Monitors an unlimited number of files on local or remote filesystems , for changes and then speak the content
This is a multiplatform general utility suite for use with existing network stumbling software, such as Kismet or NetStumbler. The program will convert between multiple output logs, including the popular wi-scan format, between platforms.
myNetWatchman Perl Agent is a program that is designed to capture rejected packet information from various firewall logs and forward this attack information to central analysis servers at myNetWatchman.com.
Nimda Stats is a simple program that analyzes Apache's error log, counts the number of Nimda virus attempts, and lists the top 100 'ip's that were used to attack your computer in an HTML file. More features coming soon.
Anonlog is a program to 'anonymize' web server logfiles
by encoding sensitive information, such as hostnames
and filenames. This allows the logfile to be sent to a
third party without revealing confidential information
about the server or clients.
The Webalizer Extractor. Exalizer is a program that extraxts data from the Webalizer data files and sets them to be replaced by simple tags that can be placed in template files. This way, you can make Webalizer data get displayed in the format YOU want!